Results 141 to 150 of about 177,129 (337)

Functional morphology of the pharyngeal teeth of the ocean sunfish, Mola mola

open access: yesThe Anatomical Record, EarlyView.
Abstract Many fish use a set of pharyngeal jaws in their throat to aid in prey capture and processing, particularly of large or complex prey. In this study—combining dissection, CT scanning, histology, and performance testing—we demonstrate a novel use of pharyngeal teeth in the ocean sunfish (Mola mola), a species for which pharyngeal jaw anatomy had ...
Benjamin Flaum   +3 more
wiley   +1 more source

Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing

open access: yesIEEE Access
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing.
K. Sasikumar, Sivakumar Nagarajan
doaj   +1 more source

Use of Elliptic Curves in Cryptography [PDF]

open access: yes, 2007
We discuss the use of elliptic curves in cryptography. In particular, we propose an analogue of the Diffie-Hellmann key exchange protocol which appears to be immune from attacks of the style of Western, Miller, and Adleman. With the current bounds for infeasible attack, it appears to be about 20% faster than the Diffie-Hellmann scheme over GF(p).
openaire   +1 more source

Predicting ecology and hearing sensitivities in Parapontoporia—An extinct long‐snouted dolphin

open access: yesThe Anatomical Record, EarlyView.
Abstract Analyses of the cetacean (whale and dolphin) inner ear provide glimpses into the ecology and evolution of extinct and extant groups. The paleoecology of the long‐snouted odontocete (toothed whale) group, Parapontoporia, is primarily marine with its depositional context also suggesting freshwater tolerance.
Joyce Sanks, Rachel Racicot
wiley   +1 more source

New digital signature protocol based on elliptic curves [PDF]

open access: yesInternational Journal on Cryptography and Information Security (2012), 2013
In this work, a new digital signature based on elliptic curves is presented. We established its efficiency and security. The method, derived from a variant of ElGamal signature scheme, can be seen as a secure alternative protocol if known systems are completely broken.
arxiv  

Synapsids and sensitivity: Broad survey of tetrapod trigeminal canal morphology supports an evolutionary trend of increasing facial tactile specialization in the mammal lineage

open access: yesThe Anatomical Record, EarlyView.
Abstract The trigeminus nerve (cranial nerve V) is a large and significant conduit of sensory information from the face to the brain, with its three branches extending over the head to innervate a wide variety of integumentary sensory receptors, primarily tactile.
Juri A. Miyamae   +4 more
wiley   +1 more source

Cohomology of moduli spaces of Del Pezzo surfaces

open access: yesMathematische Nachrichten, Volume 296, Issue 1, Page 80-101, January 2023., 2023
Abstract We compute the rational Betti cohomology groups of the coarse moduli spaces of geometrically marked Del Pezzo surfaces of degree 3 and 4 as representations of the Weyl groups of the corresponding root systems. The proof uses a blend of methods from point counting over finite fields and techniques from arrangement complements.
Olof Bergvall, Frank Gounelas
wiley   +1 more source

Home - About - Disclaimer - Privacy